by John S. Davis II, Martin C. Libicki, Stuart E. Johnson, Jason Kumar, Michael Watson, Andrew Karode
1.3 MB
Technical Details »
When defending an organization against cyberattacks, cybersecurity professionals are faced with the dilemma of selecting from a large set of cybersecurity defensive measures while operating with a limited set of resources with which to employ the measures. Engaging in this selection process is not easy and can be overwhelming. Furthermore, the challenge is exacerbated by the fact that many cybersecurity strategies are presented as itemized lists, with few hints at how to position a given action within the space of alternative actions. This report aims to address these difficulties by explaining the menu of actions for defending an organization against cyberattack and recommending an approach for organizing the range of actions and evaluating cybersecurity defensive activities.
Table of Contents
Chapter One
Motivation
Chapter Two
Core Concepts
Chapter Three
Ring 2
Chapter Four
Ring 3
Chapter Five
Using This Work
Chapter Six
Conclusion
No comments:
Post a Comment